2026-05-12 19:9CVE-2026-7474HashiCorp
PUBLISHED5.2CWE-22

Nomad vulnerable to path traversal in dynamic host volume which may lead to code execution

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.

Problem type

Affected products

HashiCorp

Nomad

< 2.0.1 - AFFECTED

Nomad Enterprise

< 2.0.1 - AFFECTED

References

GitHub Security Advisories

GHSA-hx53-77qj-8663

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the...

https://github.com/advisories/GHSA-hx53-77qj-8663

HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-7474
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-7474",
    "assignerOrgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
    "assignerShortName": "HashiCorp",
    "dateUpdated": "2026-05-13T03:58:40.530Z",
    "dateReserved": "2026-04-29T21:07:13.054Z",
    "datePublished": "2026-05-12T19:09:44.680Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "67fedba0-ff2e-4543-ba5b-aa93e87718cc",
        "shortName": "HashiCorp",
        "dateUpdated": "2026-05-12T19:09:44.680Z"
      },
      "title": "Nomad vulnerable to path traversal in dynamic host volume which may lead to code execution",
      "descriptions": [
        {
          "lang": "en",
          "value": "HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>HashiCorp Nomad and Nomad Enterprise prior to 2.0.1 are vulnerable to code execution on the client host through a path traversal attack. This vulnerability (CVE-2026-7474) is fixed in Nomad 2.0.1, 1.11.5 and 1.10.11.</p><br/>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "HashiCorp",
          "product": "Nomad",
          "platforms": [
            "64 bit",
            "32 bit",
            "x86",
            "ARM",
            "MacOS",
            "Windows",
            "Linux"
          ],
          "repo": "https://github.com/hashicorp/nomad",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "1.10.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "2.0.1"
            }
          ]
        },
        {
          "vendor": "HashiCorp",
          "product": "Nomad Enterprise",
          "platforms": [
            "64 bit",
            "32 bit",
            "x86",
            "ARM",
            "MacOS",
            "Windows",
            "Linux"
          ],
          "repo": "https://github.com/hashicorp/nomad",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "1.10.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "2.0.1"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)",
              "cweId": "CWE-22",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://discuss.hashicorp.com/t/hcsec-2026-15-nomad-vulnerable-to-path-traversal-in-dynamic-host-volume-which-may-lead-to-code-execution/77417"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126: Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "baseScore": 8.8,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This issue was reported to HashiCorp by Adrian Denkiewicz at Doyensec in collaboration with Claude and Anthropic Research"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2026-05-13T03:58:40.530Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}